Healthcare Sector Warned About Everest Ransomware Group
The Health Sector Cybersecurity Coordination Center has issued a threat profile of the Everest Ransomware group, which was behind the recent ransomware attack on Gramercy Surgery Center in New York. The group has also claimed responsibility for attacks on Horizon View Medical Center in Las Vegas, 2K Dental in Ohio, Prime Imaging in Tennessee, and Stages Pediatric Care in Florida, and has increasingly been targeting the healthcare and public health (HPH) sector since 2021. The group has added more than 120 victims to its data leak site, around 34% of which are located in the United States, and around 27% of U.S. victims are in the healthcare industry. Between April 2021 and July 2024, the group conducted at least 20 attacks on healthcare organizations, disproportionately targeting medical imaging providers. The Everest ransomware group was first identified in December 2020 and rapidly became well-known within the cybercrime community after conducting attacks on high-profile targets including the Brazilian government and NASA. The group uses double extortion tactics, where ransomware...
Breaches of Patient Confidentiality
Breaches of patient confidentiality – defined as disclosures of private information without the patient’s consent – occur more often than most people are aware of due to blind spots in reporting requirements and “information breaches of patients” – which are permitted by the HIPAA Privacy Rule and required by law in some states. Although HHS’ Office for Civil Rights publishes an annual report which includes the total number of breach notifications it receives each year, it is impossible to accurately calculate how many breaches of patient confidentiality occur each year because of reporting failures, notifications that should be retracted, and reports made “in an abundance of caution”. In addition, there are inconsistent interpretations of the HIPAA breach notification requirements, and occasions when information breaches of patients are permitted by HIPAA. It is also the case that some healthcare providers do not qualify as HIPAA covered entities, and breaches of patient confidentiality in their organizations are subject to state notification laws. Reported Breaches of...
Welltok Data Breach Victim Count Rises to 14.76 Million
More than 14.7 million individuals are now known to have been affected by the 2023 MOVEit Transfer data breach at the Denver-based patient engagement company Welltok, which makes it the second-largest healthcare data breach to be reported to the HHS’ Office for Civil Rights (OCR) by a HIPAA-regulated entity to date. While recompiling our healthcare data breach statistics this month, we found that the number of individuals affected by healthcare data breaches in 2023 had increased considerably. Currently, the OCR breach portal lists 744 healthcare data breaches in 2023 and 160,009,510 affected individuals. The massive increase was due to an updated figure for the Welltok data breach, which was previously listed as affecting 8,493,379 individuals. The Welltok data breach is now listed as affecting 14,762,475 individuals, with the update occurring at some point after April 2024. The substitute breach notice indicates at least 165 of its healthcare clients were affected. Welltok was the victim of a global cyberattack by the Clop group, which exploited a zero-day vulnerability in...
Answers Demanded from DOL About State Agencies Tipping Off Employers About Surprise Inspections
Two House Democrats have written to Department of Labor (DOL) Acting Labor Secretary Julie Su demanding answers about credible allegations that California and South Carolina Occupational Safety and Health Administration (OSHA) agencies have been tipping off employers about workplace safety inspections. Reps. Bobby Scott (D-VA), ranking member of the House Committee on Education and the Workforce, and Alma Adams (D-NC), ranking member of the Workforce Protection Subcommittee, wrote the letter in response to recent news reports that suggest inspectors are notifying employers about upcoming inspections. One such report came from a legislative hearing in California where farm workers and their advocates alleged that Cal/OSHA had been providing advance notice of its “surprise” inspections to employers. When reports are received by state agencies about potential violations of the OSH Act that are putting employees at risk of harm, surprise inspections are conducted to assess compliance with safety and health regulations. If employers are provided with advance warning that they will be...
CISA & Partners Issue Guidance & Best Practices for Event Logging and Threat Detection
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), and their international partners have issued guidance on event logging and threat detection. HIPAA-regulated entities are required to implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information (ePHI) and to regularly review those logs to identify unauthorized activity. These include application logs of user activity in ePHI systems/applications, which capture information such as files opened, records accessed, and the creation, reading, editing, or deletion of records associated with ePHI, and system-level logs, which include successful and unsuccessful login attempts, devices used to log on, and the applications that were successfully or unsuccessfully accessed. The latest guidance from CISA and partners is aimed at medium to large organizations and includes...



